Site icon API Security Blog

Exploit for Unprotected Alternate Channel in Crushftp

image
๐Ÿ’ฅ CVE-2025-54309 โ€“ CrushFTP Unauthenticated Remote Command Execution Exploit PoC by Issam Junior ๐Ÿšจ Vulnerability Overview CVE: CVE-2025-54309 CVSS: 9.8 (Critical) Product: CrushFTP Impact: Unauthenticated Remote Command Execution (RCE) over HTTPS CrushFTP, a popular enterprise file transfer solution, suffers from a critical vulnerability in its DMZ proxy implementation. Missing checks allow external attackers to reach the admin interface via HTTPS POST requests, bypassing authentication and directly invoking system commands. Technical Breakdown The vulnerability exists due to an incomplete validation in the DMZ proxy's handling of HTTPS requests. By crafting a malicious XML-RPC request to the /WebInterface/function/ endpoint, attackers can trigger system commands on the server without authentication. This flaw allows full server compromise, data theft, and lateral movement. Affected Versions: All CrushFTP versions prior to 10.7.0 (verify with vendor advisories for specifics). ๐Ÿ•ต๏ธโ€โ™‚๏ธ Dorks for Hunting CrushFTP Servers ๐Ÿ”Ž Shodan Dorks http.favicon.hash:427298725 "CrushFTP" http.html:"CrushFTP" product:"CrushFTP" ssl:"CrushFTP" port:443 "CrushFTP" ๐ŸฆŠ Ffuf/Faff Dorks (URL Discovery) /WebInterface/function/ /WebInterface/login/ /WebInterface/json/ /WebInterface/info/ /favicon.ico ๐Ÿ•ท๏ธ Hunter Dorks (Google, Censys, etc.) title:"CrushFTP WebInterface" "Powered by CrushFTP" inurl:/WebInterface/function/ inurl:/WebInterface/login/ โšก Exploit Features Multiple Payloads: xml:โ€ฆRead More

Exit mobile version